HP CISO seeks to transform cybersecurity

HP CISO seeks to transform cybersecurity

Driven by digital imperatives, more IT leaders have shed their order-taking shackles to become full-fledged business partners. Cybersecurity leaders are increasingly taking the same tack. Joanna Burkey, who rejoined HP one year ago, is one CISO leading the charge. Burkey, who spent nearly 13 years in various roles at HP before exiting to lead cybersecurity at Siemens for 5 years, found a cyber program with a strong operational focus. But Burkey believed HP could benefit…

Read More

Paleo Lifestyle Site Found Leaking PII on 70,000 Users

Paleo Lifestyle Site Found Leaking PII on 70,000 Users

A misconfigured AWS S3 bucket is leaking personal information on 70,000 customers of a popular paleolithic lifestyle site, security researchers at vpnMentor have revealed. The research team, led by Noam Rotem, discovered the 290MB trove on February 4, and traced it back to Paleohacks, a US health and lifestyle brand that offers content and resources about the paleo diet. “At the time of writing, the company has ignored every attempt we’ve made to help them close the…

Read More

DC Officer Info Leaked Online by Ransomware Group: Report

DC Officer Info Leaked Online by Ransomware Group: Report

The personal safety of Washington DC police officers may be at risk after it emerged that ransomware threat actors had managed to steal personnel files in an attack earlier this month. The acting chief of the US capital’s Metropolitan Police Department (MPD), Robert Contee, said in an email to staff that ‘HR files’ containing personal information were part of the haul, according to CNN. That adds extra jeopardy for officers in the event that the…

Read More

Artificial Intelligence: driving innovation while safeguarding ethics and privacy – Cisco Blogs

Artificial Intelligence: driving innovation while safeguarding ethics and privacy – Cisco Blogs

The phone in your hand, the network it runs on, the public transportation app you’re using to commute… It’s likely that each of them contains a touch of Artificial Intelligence (AI) to make your experience more efficient, seamless, secure, and personalized. At Cisco, we develop innovative services that advance healthcare, enhance education, provide remote working, improve government services to citizens, expand accessibility, and strengthen cybersecurity. We deliver technological advances that help us go beyond what…

Read More

5 minutes with Brent Johnson – Hybrid is the new remote (workplace)

5 minutes with Brent Johnson – Hybrid is the new remote (workplace)

5 minutes with Brent Johnson – Hybrid is the new remote (workplace) | 2021-04-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Enterprise security’s evolution in Asia: Building business continuity and resilience

Enterprise security’s evolution in Asia: Building business continuity and resilience

Enterprise security’s evolution in Asia: Building business continuity and resilience | 2021-04-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

When it comes to cyber risk, company size doesn’t matter

When it comes to cyber risk, company size doesn’t matter

When it comes to cyber risk, company size doesn’t matter | 2021-04-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

4 cosas que debe incluir una política de gestión de vulnerabilidades

4 cosas que debe incluir una política de gestión de vulnerabilidades

Las organizaciones se enfrentan a un panorama de amenazas en constante evolución, esa es una de las circunstancias que hacen es imperativo que las organizaciones mantengan una política de gestión de vulnerabilidades actualizada para corregir y controlar las vulnerabilidades de seguridad que pueden conducir a una brecha en la seguridad de la información. Con esto en cuenta, una buena política de gestión de vulnerabilidades debe contener lo siguiente: Una visión general de lo que se…

Read More

CX Turned IT UP at Cisco Live! – Cisco Blogs

CX Turned IT UP at Cisco Live! – Cisco Blogs

What a year 2020 turned out to be! This year’s Cisco Live was about more than just IT. It was about people coming together to affect change. A large part of that change centered around remote work, with research showing that, by 2025, 36.2 million Americans (22% of the workforce) will work remotely.1 The rapid and sudden shift last year to remote work around the world brought with it a range of new business and IT challenges to enable secure remote collaboration and accelerated digital transformation….

Read More

Red Hat buttresses edge features in RHEL 8.4

Red Hat buttresses edge features in RHEL 8.4

New features in Red Hat Enterprise Linux (RHEL) are tuned to provide better remote support for edge networking where processor- and memory-constrained devices can present management problems. RHEL 8.4 announced this week at Red Hat Summit has new capability to send lighter-weight universal base images and is designed for potentially less capable edge devices, letting Red Hat customers deploy edge applications more flexibly. In addition to the new RHEL version, Red Hat announced updates to…

Read More
1 3,487 3,488 3,489 3,490 3,491 3,910